Posts Tagged: cyber security

GovUp & Cisco: The nature of digital trust

Let’s look at one of the basic elements of network security that Chris Coleman mentioned during his presentation Tuesday night (petulant microphone not included). He spoke of trust, trust in the network beneath the Internet, beneath the applications, the companies and the net itself. Without said trust, as Coleman said, the entire system of exchanges,Read… Read more »

Cyber Vetting for Security Clearances

The Electronic Freedom Foundation recently obtained information under the Freedom of Information Act regarding a June 2009 report of a study sponsored by the Office of the Director of National Intelligence (ODNI) on the use of Cyber Vetting for security clearance purposes. The study involved 349 test cases of intelligence agency applicants who consented toRead… Read more »

Army Embraces Commercial Technology, Enables Mobile Workforce

Defense agencies today are faced with an ever-increasing challenge to cut cost while maintaining or even increasing productivity. In today’s Federal workplace, vast numbers of employees are supported by extensive local area networks that require constant maintenance and periodic upgrades. Collectively, servers and workstations are expensive to maintain and secure. The Department of Defense needsRead… Read more »

Anna Kournikova Allova Again: New Worm Underscores Need for Greater Cyber Awareness

In early 2001 a computer worm sent via email with the subject line “Here you have” created havoc for hundreds of thousands of Internet users. The malicious email promised recipients a file attachment containing a photo of tennis player Anna Kournikova. But when users clicked on the file to open it, they inadvertently executed codeRead… Read more »

Privacy News Highlights – August 15th

Some top privacy news Biometrics US – U.S. Scans Afghan Inmates for Biometric Database Wired reports on the U.S. military’s new detention facility in Parwan, Afghanistan, as “an emerging datafarm” where all detainees brought to the facility are given medical exams and have their irises scanned and fingerprints taken to be stored in a militaryRead… Read more »

LandWarNet – Military and Government Technology

I recently spent a week in beautiful Tampa, Florida for the U.S. Army’s premier information technology conference and showcase – the Armed Forces Communications and Electronics Association’s (AFCEA) LandWarNet. The show floor was buzzing this year, with more than 9,000 government and industry attendees and more than 300 exhibits. I caught up with Becky Nolan,Read… Read more »

SIR v8

The Microsoft Security Intelligence Report (SIR) is a comprehensive and wide-ranging study of the evolving threat landscape, and addresses such topics as software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. http://www.microsoft.com/security/about/sir/videos.aspx#2

Federal Hiring Under Expedited Process

The Air Force will try to fill 700 cybersecurity positions under an expedited process. The “Schedule A” approach allows the service to proceed without posting or publicizing positions. Meanwhile, the administration is working to streamline the government’s overall hiring process, which now requires an average of 140 days to hire. “When you think about theRead… Read more »

Help Wanted: U.S. Needs Cybersecurity Experts and Fast!

Our friends at Center for Strategic and International Studies (CSIS) recently issued a study called “A Human Capital Crisis in Cybersecurity,” that highlights how the United States is facing a chronic shortage in the quality and quantity of its cybersecurity experts. As such, the nation unprepared to defend itself against increasingly sophisticated online attacks. TheRead… Read more »

Privacy, Profit, and Innovation

Give us your cookies, your browser history, your torrid search queries, yearning to breathe free. (Sorry, Emma.) That’s the deepest desire of online marketers, and it is thanks to them that we have so much content and so many applications available to us free, online, every day. Our data is valuable, but not in itselfRead… Read more »